
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2018 07:32 AM
Hi everyone,
I was wondering if I can create policy sets where the TLS version (and possibly even cipher suite) can be a stipulation for success. For example, if a certain group of endpoints support TLS 1.0, 1.1 and 1.2, I could demand that only if they negotiated on TLS 1.2 would authentication succeed.
Thanks!
Solved! Go to Solution.
- Labels:
-
Identity Services Engine (ISE)
Accepted Solutions

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2018 09:31 AM
Pretty sure the answer is no on this. I will Double check
It’s a global setting so if a client can do 1.2 then it does. If another client can’t it will negotiate lower if ise is set to allow it
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2018 10:37 AM
You will need to enable the TLS version you authorize to communicate (authenticate) with ISE. By default (on version 2.x) it's TLS1.2.
However, you won't be able to do some policies based on TLS version. You can just play with global settings by allowing tls1.0 and tls 1.1 or not.
Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2018 05:19 AM

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2018 09:31 AM
Pretty sure the answer is no on this. I will Double check
It’s a global setting so if a client can do 1.2 then it does. If another client can’t it will negotiate lower if ise is set to allow it
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2018 10:37 AM
You will need to enable the TLS version you authorize to communicate (authenticate) with ISE. By default (on version 2.x) it's TLS1.2.
However, you won't be able to do some policies based on TLS version. You can just play with global settings by allowing tls1.0 and tls 1.1 or not.
Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2018 12:43 AM - edited 11-11-2018 12:45 AM
Hey,
Globally enabling or disabling a TLS version isn't the most granular of approaches, but it's what the product supports.
I sent an enhancement request a few days ago to support authenticating by TLS version as part of an authentication policy, so that certain endpoints can authenticate only with TLS 1.2, others only with TLS 1.1 or TLS 1.0, etc.
This is in part to avoid renegotiation attacks and using susceptible encryption and hash functions.
I hope someone in Cisco will think it over :)

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2018 05:19 AM
